|
[1]Latanya Sweeney, “k-anonymity: A Model for Protecting Privacy, International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, May 2002. [2]B. Zhou and J. Pei, “Preserving privacy in social networks against neighborhood attacks, in Proc. of IEEE ICDE, 2008. [3]M. Faloutsos et al., “On power-law relationships of the internet topology, in SIGCOMM’99, 1999. [4]A. Machanvajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, “l-diversity: Privacy beyond k- anonymity, in Proc. 22nd Intnl. Conf. Data Engg. (ICDE), page 24, 2006. [5]N. Li and T. Li, “T-Closeness: Privacy Beyond K-Anonymity and L-Diversity, Proc. IEEE 23rd Int’l Conf. Data Eng. (ICDE ‘07), pp. 106-115, 2007. [6]Bin Zhou and Jian Pei, “Preserving Privacy in Social Network against Neighborhood Attacks, in Proc. of IEEE ICDE, 2008. [7]M. R. Garey, David S. Johnson, “Computers and Intractability: A Guide to the Theory of NP- Completeness, W. H. Freeman 1979,ISBN 0-7167-1044-7. [8]X. Yan and J. Han, “gspan : Graph-based substructure pattern mining, in Proc. of IEEE ICDE ,2002. [9]Lei Zou, Lei Chen and M. Tamer Özsu, “K-Automorphism: A General Framework For Privacy Preserving Network Publication, Proceedings of the VLDB Endowment vol.2, August 2009
|